Enrolments for this year have closed. Keep exploring subjects.
QS RANKING 2022
Times Higher Education Ranking 2022
On successful completion of this subject, you will be able to:
- Describe and discuss criminological theories and how they relate to cybercrime.
- Engage in informed, scholarly debate about cybercrime and their potential impact on globalised society with fellow students and staff.
- Explain the importance of cyberspace in changing the nature of offending, policing and victimisation.
- Research and synthesise relevant policy issues.
- Demonstrate the ability to communicate ideas in a clear and effective manner.
- Introduction to Cybercrime
- Social Media
- Cyber Piracy
- Online Fraud & Identity Theft
- Cyber Espionage
- Online drug trade & the Dark Net
- Political Hacking
- Illegal, Harmful, Offensive Content Online
- Cyber Warfare
- Prosecuting cybercrime
- The future of cybercrime & unit wrap-up
You must have successfully completed the following subject(s) before starting this subject:
Pre-requisite 50cp at 1000 level or above
- Other requirements -
Students who have an Academic Standing of Suspension or Exclusion under Macquarie University's Academic Progression Policy are not permitted to enrol in OUA units offered by Macquarie University. Students with an Academic Standing of Suspension or Exclusion who have enrolled in units through OUA will be withdrawn.
Computer systems and networks, and the applications that they support, are essential to information flows, economic transactions and critical infrastructure in the twenty-first century. While early computer hackers were more interested in exploration, modern cybercrime is increasingly driven by activist or malicious sentiment (hacktivism), espionage and/or the desire for profit. This unit will present an overview of cyber security in practice with reference to both public and private sector organisations. The unit will look at the motives and perpetrators of cybercrime. It will explore how individuals and organisations face specific threats from their use of technology and identifies challenges in maintaining cyber and information security. It further examines the protective security measures required to protect physical and digital access to information through people, infrastructure and computer systems.
- Tutorial Participation (10%)
- Weekly Quizzes (20%)
- Powerpoint Presentation (20%)
- Research Essay (50%)